Facebook unveils new vulnerability disclosure policy
The company will publish all flaws it discovers within 21 days, if third-party developers don’t respond to communication
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Facebook has announced a new policy for disclosing vulnerabilities in third-party software detected by its internal security researchers. The company will publicly disclose vulnerabilities in third-party code and systems, including open-source software, 90 days after reporting them, should there be no fixes.
However, if third-party developers don’t respond to reports within 21 days, the social media giant has threatened to disclose these flaws publicly anyway, regardless of the status of any patches.
The firm has outlined these policies as it ramps up its efforts to identify and disclose flaws in order to ensure developers fix them as soon as possible, the company claims.
Although each vulnerability will be taken on a case-by-case basis, Facebook says there are occasions on which it will deviate from its 90-day requirement.
Disclosure will come sooner if any bug is being actively exploited or if a fix is ready but has been delayed unnecessarily, while in cases that a project’s release cycle may dictate a longer window, the bug’s publication will be delayed.
“In a nutshell, Facebook will contact the appropriate responsible party and inform them as quickly as reasonably possible of a security vulnerability we’ve found,” the company posted in an update.
“We expect the third party to respond within 21 days to let us know how the issue is being mitigated to protect the impacted people. If we don’t hear back within 21 days after reporting, Facebook reserves the right to disclose the vulnerability. If within 90 days after reporting there is no fix or update indicating the issue is being addressed in a reasonable manner, Facebook will disclose the vulnerability.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
RELATED RESOURCE
Enhance the safety and security of your people, assets, and operations
Enable a true vision of security with an engineered solution based on hyperconverged and storage platforms
“That said, we will adhere to the vulnerability disclosure steps and the proposed timelines whenever reasonably possible, but we can envision scenarios where there might be deviations. If Facebook determines that disclosing a security vulnerability in third party code or systems sooner serves to benefit the public or the potentially impacted people, we reserve the right to do so.”
This has come in conjunction with the launch of a separate security advisory segment for WhatsApp, the launch of which revealed six new flaws affecting versions of the online messaging platform, ranging in nature and severity. The flaw CVE-2020-1894, for example, is a stack write overflow bug, while CVE-2020-1889 is a security feature bypass issue in WhatsApp Desktop.
Facebook��s programme is fairly similar to industry-standard vulnerability disclosure schemes, particularly in terms of the 90-day publication policy which has been adopted by many rival tech companies. Google’s Project Zero, for example, has touted the benefits of a 90-day disclosure policy, also rolling out an automatic 90-day disclosure policy in January.
Apple, by way of contrast, was criticised for implementing an effectively ‘limitless’ disclosure window on its new internal iPhone bug-hunting scheme, with security researchers describing these policies as a “poison pill”.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
AWS CEO Matt Garman isn’t convinced AI spells the end of the software industryNews Software stocks have taken a beating in recent weeks, but AWS CEO Matt Garman has joined Nvidia's Jensen Huang and Databricks CEO Ali Ghodsi in pouring cold water on the AI-fueled hysteria.
-
Deepfake business risks are growingIn-depth As the risk of being targeted by deepfakes increases, what should businesses be looking out for?
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible